Analysis
-
max time kernel
286s -
max time network
308s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
31/07/2022, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe
Resource
win7-20220715-en
General
-
Target
8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe
-
Size
1.7MB
-
MD5
44df72212127215eff6b18cc9f250971
-
SHA1
497cfce96217cfbbd6fcd14d9af6b6114eaecd9f
-
SHA256
8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5
-
SHA512
9213bcbf112e1a4ceb584292d8d86005f636b071b154ab7cee90745965e148d7e145d22d21cd15b8431a48c8c9d2b310b5ab04c06fc2a75289d020a3d1a4a03e
Malware Config
Extracted
redline
185.186.142.127:6737
193.106.191.160:8673
194.93.2.28:21390
-
auth_value
1fce8029e8fab4e62b767b33e52bdb9e
Extracted
redline
@moriwWs
neredenkyor.xyz:81
-
auth_value
c2f987b4e6cd55ad1315311e92563eca
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 12 IoCs
resource yara_rule behavioral1/memory/690172-73-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/738664-84-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/742108-79-0x0000000000090000-0x00000000000B0000-memory.dmp family_redline behavioral1/memory/738664-99-0x000000000041ADD6-mapping.dmp family_redline behavioral1/memory/690172-96-0x000000000041BC3E-mapping.dmp family_redline behavioral1/memory/742108-94-0x00000000000AB50E-mapping.dmp family_redline behavioral1/memory/738664-103-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/742108-107-0x0000000000090000-0x00000000000B0000-memory.dmp family_redline behavioral1/memory/742108-109-0x0000000000090000-0x00000000000B0000-memory.dmp family_redline behavioral1/memory/690172-108-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/690172-105-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/738664-104-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 940 v.exe 18108 r.exe 41484 g.exe 75284 x.exe -
Loads dropped DLL 8 IoCs
pid Process 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 41484 set thread context of 742108 41484 g.exe 36 PID 940 set thread context of 690172 940 v.exe 34 PID 18108 set thread context of 738664 18108 r.exe 37 PID 75284 set thread context of 739480 75284 x.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 742108 AppLaunch.exe 738664 AppLaunch.exe 690172 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 738664 AppLaunch.exe Token: SeDebugPrivilege 742108 AppLaunch.exe Token: SeDebugPrivilege 690172 AppLaunch.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1112 wrote to memory of 940 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 26 PID 1112 wrote to memory of 940 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 26 PID 1112 wrote to memory of 940 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 26 PID 1112 wrote to memory of 940 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 26 PID 1112 wrote to memory of 18108 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 28 PID 1112 wrote to memory of 18108 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 28 PID 1112 wrote to memory of 18108 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 28 PID 1112 wrote to memory of 18108 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 28 PID 1112 wrote to memory of 41484 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 30 PID 1112 wrote to memory of 41484 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 30 PID 1112 wrote to memory of 41484 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 30 PID 1112 wrote to memory of 41484 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 30 PID 1112 wrote to memory of 75284 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 32 PID 1112 wrote to memory of 75284 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 32 PID 1112 wrote to memory of 75284 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 32 PID 1112 wrote to memory of 75284 1112 8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe 32 PID 41484 wrote to memory of 742108 41484 g.exe 36 PID 41484 wrote to memory of 742108 41484 g.exe 36 PID 41484 wrote to memory of 742108 41484 g.exe 36 PID 41484 wrote to memory of 742108 41484 g.exe 36 PID 41484 wrote to memory of 742108 41484 g.exe 36 PID 41484 wrote to memory of 742108 41484 g.exe 36 PID 41484 wrote to memory of 742108 41484 g.exe 36 PID 940 wrote to memory of 690172 940 v.exe 34 PID 940 wrote to memory of 690172 940 v.exe 34 PID 940 wrote to memory of 690172 940 v.exe 34 PID 940 wrote to memory of 690172 940 v.exe 34 PID 940 wrote to memory of 690172 940 v.exe 34 PID 940 wrote to memory of 690172 940 v.exe 34 PID 940 wrote to memory of 690172 940 v.exe 34 PID 940 wrote to memory of 690172 940 v.exe 34 PID 18108 wrote to memory of 738664 18108 r.exe 37 PID 18108 wrote to memory of 738664 18108 r.exe 37 PID 18108 wrote to memory of 738664 18108 r.exe 37 PID 18108 wrote to memory of 738664 18108 r.exe 37 PID 18108 wrote to memory of 738664 18108 r.exe 37 PID 18108 wrote to memory of 738664 18108 r.exe 37 PID 18108 wrote to memory of 738664 18108 r.exe 37 PID 75284 wrote to memory of 739480 75284 x.exe 35 PID 75284 wrote to memory of 739480 75284 x.exe 35 PID 75284 wrote to memory of 739480 75284 x.exe 35 PID 75284 wrote to memory of 739480 75284 x.exe 35 PID 75284 wrote to memory of 739480 75284 x.exe 35 PID 75284 wrote to memory of 739480 75284 x.exe 35 PID 75284 wrote to memory of 739480 75284 x.exe 35 PID 41484 wrote to memory of 742108 41484 g.exe 36 PID 18108 wrote to memory of 738664 18108 r.exe 37 PID 75284 wrote to memory of 739480 75284 x.exe 35 PID 41484 wrote to memory of 742108 41484 g.exe 36 PID 940 wrote to memory of 690172 940 v.exe 34 PID 18108 wrote to memory of 738664 18108 r.exe 37 PID 75284 wrote to memory of 739480 75284 x.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe"C:\Users\Admin\AppData\Local\Temp\8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\v.exe"C:\Users\Admin\AppData\Local\Temp\v.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:690172
-
-
-
C:\Users\Admin\AppData\Local\Temp\r.exe"C:\Users\Admin\AppData\Local\Temp\r.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:18108 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:738664
-
-
-
C:\Users\Admin\AppData\Local\Temp\g.exe"C:\Users\Admin\AppData\Local\Temp\g.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:41484 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:742108
-
-
-
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:75284 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:739480
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5c2fb7cd0cd6ed34e9ecebec33e4b2977
SHA1ba46fecd84c4b138f3cbe6074539f2ca95ab9e36
SHA25683ac1f2ae2aed80455750c99992559f009ba2bcf450d21d7fd74b52c4149de71
SHA512d7bf5d2b68304a7c2076e4d60d1fd772a617a25eadbc255920f6f64001edf053dca8fd948326ce1b99b3facef000493867c4c8743d350ad48dec2b8cf6adb551
-
Filesize
2.4MB
MD5f9553db053dc46b78d5df4250b7eb856
SHA15746f285f9ded98b81c653afd13167d117f503a0
SHA256797087014be1f103e61780d6061c0fc34ce5e899158d924221523d6d372ee5fb
SHA512da388a8aab24924b9b4d7a86cf4496e9159c1f5ca6e15d0fed61d73ca381ea19b2b8a3830f9812ce54b634cd0b15b24eaf13e23018ba8cb6be72b9e7205f011f
-
Filesize
1.3MB
MD582b89beccee5a94ed7b5e658378a2ab9
SHA10bfb7aa1c4186278b202e0d2fae5a5374a563454
SHA25627647e78a83d0ec40696f05d8d8cfbafbcfb778c9301c368991320a0e9c12428
SHA512a5b990dd74f4ab39a5465f515dde824da0f2fc43121c51b7469c29d49d5a439c74353a3e18c1015092615e5eb2c0cf21ead43930ce71a2359ed40442ca7e38ee
-
Filesize
2.5MB
MD540badae91f0c7250d2c230f4d3ca2266
SHA1eeec6634aa7ea776d76cf5f0b904e31a64caf05c
SHA2565a5db1b91bfbd2b4ce79745651bfaa120bcf4d0c6cc1aeccfbae852df176c3f7
SHA5123ba66cb90347ffe28b35fe775203af9b9e1c66c612a0cf12bb9d029d79f863e153d9fbb9020a7299f54567b6003b0cd680759a9cb64409509ddf1b49804c99e9
-
Filesize
1.4MB
MD5c2fb7cd0cd6ed34e9ecebec33e4b2977
SHA1ba46fecd84c4b138f3cbe6074539f2ca95ab9e36
SHA25683ac1f2ae2aed80455750c99992559f009ba2bcf450d21d7fd74b52c4149de71
SHA512d7bf5d2b68304a7c2076e4d60d1fd772a617a25eadbc255920f6f64001edf053dca8fd948326ce1b99b3facef000493867c4c8743d350ad48dec2b8cf6adb551
-
Filesize
1.4MB
MD5c2fb7cd0cd6ed34e9ecebec33e4b2977
SHA1ba46fecd84c4b138f3cbe6074539f2ca95ab9e36
SHA25683ac1f2ae2aed80455750c99992559f009ba2bcf450d21d7fd74b52c4149de71
SHA512d7bf5d2b68304a7c2076e4d60d1fd772a617a25eadbc255920f6f64001edf053dca8fd948326ce1b99b3facef000493867c4c8743d350ad48dec2b8cf6adb551
-
Filesize
2.4MB
MD5f9553db053dc46b78d5df4250b7eb856
SHA15746f285f9ded98b81c653afd13167d117f503a0
SHA256797087014be1f103e61780d6061c0fc34ce5e899158d924221523d6d372ee5fb
SHA512da388a8aab24924b9b4d7a86cf4496e9159c1f5ca6e15d0fed61d73ca381ea19b2b8a3830f9812ce54b634cd0b15b24eaf13e23018ba8cb6be72b9e7205f011f
-
Filesize
2.4MB
MD5f9553db053dc46b78d5df4250b7eb856
SHA15746f285f9ded98b81c653afd13167d117f503a0
SHA256797087014be1f103e61780d6061c0fc34ce5e899158d924221523d6d372ee5fb
SHA512da388a8aab24924b9b4d7a86cf4496e9159c1f5ca6e15d0fed61d73ca381ea19b2b8a3830f9812ce54b634cd0b15b24eaf13e23018ba8cb6be72b9e7205f011f
-
Filesize
1.3MB
MD582b89beccee5a94ed7b5e658378a2ab9
SHA10bfb7aa1c4186278b202e0d2fae5a5374a563454
SHA25627647e78a83d0ec40696f05d8d8cfbafbcfb778c9301c368991320a0e9c12428
SHA512a5b990dd74f4ab39a5465f515dde824da0f2fc43121c51b7469c29d49d5a439c74353a3e18c1015092615e5eb2c0cf21ead43930ce71a2359ed40442ca7e38ee
-
Filesize
1.3MB
MD582b89beccee5a94ed7b5e658378a2ab9
SHA10bfb7aa1c4186278b202e0d2fae5a5374a563454
SHA25627647e78a83d0ec40696f05d8d8cfbafbcfb778c9301c368991320a0e9c12428
SHA512a5b990dd74f4ab39a5465f515dde824da0f2fc43121c51b7469c29d49d5a439c74353a3e18c1015092615e5eb2c0cf21ead43930ce71a2359ed40442ca7e38ee
-
Filesize
2.5MB
MD540badae91f0c7250d2c230f4d3ca2266
SHA1eeec6634aa7ea776d76cf5f0b904e31a64caf05c
SHA2565a5db1b91bfbd2b4ce79745651bfaa120bcf4d0c6cc1aeccfbae852df176c3f7
SHA5123ba66cb90347ffe28b35fe775203af9b9e1c66c612a0cf12bb9d029d79f863e153d9fbb9020a7299f54567b6003b0cd680759a9cb64409509ddf1b49804c99e9
-
Filesize
2.5MB
MD540badae91f0c7250d2c230f4d3ca2266
SHA1eeec6634aa7ea776d76cf5f0b904e31a64caf05c
SHA2565a5db1b91bfbd2b4ce79745651bfaa120bcf4d0c6cc1aeccfbae852df176c3f7
SHA5123ba66cb90347ffe28b35fe775203af9b9e1c66c612a0cf12bb9d029d79f863e153d9fbb9020a7299f54567b6003b0cd680759a9cb64409509ddf1b49804c99e9